In this study, performance characteristics such as power take off (PTO) power consumption, fuel consumption, fuel consumption for the unit field-unit product were determined at different working speeds with two different PTO applications (540 and 540E) in a single row disc type silage machine. In particular, the 540E PTO application greatly reduces fuel consumption for unit work. The best results in terms of hourly fuel consumption were achieved in 540E PTO application and V1 working speed. When the field - product fuel consumption is evaluated, the best results were obtained with the 540E PTO application at the V3 working speed. When an evaluation is made considering all the parameters, it is concluded that the 540E PTO application will provide certain advantages in terms of fuel consumption compared to the 540 PTO application for the silage machine operating by taking the motion from PTO. 540E PTO application can be used as an important alternative to 540 PTO application for machines of similar capacity and features.
المستودع الرقمي العراقي. مركز المعلومات الرقمية التابع لمكتبة العتبة العباسية المقدسة
This paper proposes a new algorithm (F2SE) and algorithm (Alg(n – 1)) for solving the
two-machine flow shop problem with the objective of minimizing total earliness. This
complexity result leads us to use an enumeration solution approach for the algorithm (F2SE)
and (DM) is more effective than algorithm Alg( n – 1) to obtain approximate solution.
Diffraction patterns formed by a ferronematic sample, which contains 4-(trans-4-n-hexylcyclohexyl)-isothiocyanatobenzene (6CHBT) liquid crystal doped with Fe3O4 rodlike magnetic nanoparticles, was studied. The studied mixture can be applicated as a liquid magnetic switch. The diffraction patterns were observed from the micro-lines scribed on the polymer layer, which was contained by the liquid crystal mixture cell, with dimensions of 4 nm for depth and 0.32 µm for width and 5000 line per 1 mm2 in the case of absence and presence of the DC magnetic field. From the experimental results, it was observed that the application of the magnetic field caused more than 17% expansion in the diffraction patterns a
... Show MoreThis study aimed to study the inhibition activity of purified bacteriocin produced from the local isolation Lactococcuslactis ssp. lactis against pathogenic bacteria species isolated from clinical samples in some hospitals Baghdad city. Screening of L. lactis ssp. Lactis and isolated from the intestines fish and raw milk was performed in well diffusion method. The results showed that L. lactis ssp. lactis (Lc4) was the most efficient isolate in producing the bacteriocin as well observed inhibitory activity the increased that companied with the concentration, the concentration of the twice filtrate was better in obtaining higher inhibition diameters compared to the one-fold concentration. The concentrate
... Show MoreThe existing investigation explains the consequence of irradiation of violet laser on the structure properties of MawsoniteCu6Fe2SnS8 [CFTS] thin films. The film was equipped by the utilization of semi-computerized spray pyrolysis technique (SCSPT), it is the first time that this technique is used in the preparation and irradiation using a laser. when the received films were processed by continuous red laser (700 nm) with power (>1000mW) for different laser irradiation time using different number of times a laser scan (0, 6, 9, 12, 15 and 18 times) with total irradiation time (0,30,45,60,75,90 min) respectively at room temperature.. The XRD diffraction gave polycrysta
... Show MoreSentiment analysis is one of the major fields in natural language processing whose main task is to extract sentiments, opinions, attitudes, and emotions from a subjective text. And for its importance in decision making and in people's trust with reviews on web sites, there are many academic researches to address sentiment analysis problems. Deep Learning (DL) is a powerful Machine Learning (ML) technique that has emerged with its ability of feature representation and differentiating data, leading to state-of-the-art prediction results. In recent years, DL has been widely used in sentiment analysis, however, there is scarce in its implementation in the Arabic language field. Most of the previous researches address other l
... Show MoreCoronavirus disease (COVID-19), which is caused by SARS-CoV-2, has been announced as a global pandemic by the World Health Organization (WHO), which results in the collapsing of the healthcare systems in several countries around the globe. Machine learning (ML) methods are one of the most utilized approaches in artificial intelligence (AI) to classify COVID-19 images. However, there are many machine-learning methods used to classify COVID-19. The question is: which machine learning method is best over multi-criteria evaluation? Therefore, this research presents benchmarking of COVID-19 machine learning methods, which is recognized as a multi-criteria decision-making (MCDM) problem. In the recent century, the trend of developing
... Show MoreIn this paper, a new class of ordinary differential equations is designed for some functions such as probability density function, cumulative distribution function, survival function and hazard function of power function distribution, these functions are used of the class under the study. The benefit of our work is that the equations ,which are generated from some probability distributions, are used to model and find the solutions of problems in our lives, and that the solutions of these equations are a solution to these problems, as the solutions of the equations under the study are the closest and the most reliable to reality. The existence and uniqueness of solutions the obtained equations in the current study are dis
... Show MoreThis paper proposes a new methodology for improving network security by introducing an optimised hybrid intrusion detection system (IDS) framework solution as a middle layer between the end devices. It considers the difficulty of updating databases to uncover new threats that plague firewalls and detection systems, in addition to big data challenges. The proposed framework introduces a supervised network IDS based on a deep learning technique of convolutional neural networks (CNN) using the UNSW-NB15 dataset. It implements recursive feature elimination (RFE) with extreme gradient boosting (XGB) to reduce resource and time consumption. Additionally, it reduces bias toward
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show More